<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"><channel><description>Digital Services, Education &amp; Content Creation&#xA;&#xA;Learn more: www.techicsavvy.com/start-here</description><link>https://bsky.app/profile/funbirdllc.bsky.social</link><title>@funbirdllc.bsky.social - FUNBIRD LLC</title><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mleanfiuwe2m</link><description>📦 New on TechicSavvy: SBOMs &amp; Vulnerability Management — CySA+ Domain 2 What SBOMs are · EO 14028 requirements · CVSS vs EPSS vs KEV · vuln management workflow. Free 👇 techicsavvy.com/sbom-vulnerability-management/ #CySA #VulnMgmt #SBOM #BlueTeam #CompTIA&#xA;https://techicsavvy.com/sbom-vulnerability-management/?utm_source=bluesky&amp;utm_medium=jetpack_social</description><pubDate>08 May 2026 17:23 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mleanfiuwe2m</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mlbp2zbig72w</link><description>🌐 New on TechicSavvy:&#xA;&#xA;NetworkMiner Part 2 — Advanced Filtering &amp; Malware Artifacts&#xA;&#xA;Recover malware from PCAP · build investigation workflows · know when to switch to Wireshark.&#xA;&#xA;Free 👇 techicsavvy.com/networkminer-blue-team-part-2/&#xA;&#xA;#BlueTeam #NetworkMiner #CySA #SOC&#xA;https://techicsavvy.com/networkminer-blue-team-part-2/?utm_source=bluesky&amp;utm_medium=jetpack_social</description><pubDate>07 May 2026 17:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mlbp2zbig72w</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3ml76l3vsw62z</link><description>🌐 New on TechicSavvy:&#xA;&#xA;NetworkMiner Blue Team Series — Part 1&#xA;&#xA;Extract files, credentials &amp; host data from PCAP traffic.&#xA;&#xA;Beginner-friendly blue team lab walkthrough for CySA+ Domain 3.&#xA;&#xA;Free 👇 techicsavvy.com/networkminer-blue-team-part-1/&#xA;&#xA;#BlueTeam #NetworkMiner #CySA #SOC #CompTIA&#xA;https://techicsavvy.com/networkminer-blue-team-part-1/?utm_source=bluesky&amp;utm_medium=jetpack_social</description><pubDate>06 May 2026 17:02 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3ml76l3vsw62z</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mksj2djrp72v</link><description>📊 New on TechicSavvy: SOC KPI Selection — MTTD, MTTR &amp; more Which metric do you pick for each CySA+ scenario? MTTD · MTTR · False Positive Rate · Alert Volume · Dwell Time Free 👇 techicsavvy.com/soc-kpi-selection/ #CySA #SOC #BlueTeam #CyberSecurity #CompTIA&#xA;https://techicsavvy.com/soc-kpi-selection/?utm_source=bluesky&amp;utm_medium=jetpack_social</description><pubDate>01 May 2026 16:05 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mksj2djrp72v</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mkq4eklelm2v</link><description>🚨 New on TechicSavvy:&#xA;&#xA;IR Phase Sequencing — Triage vs Escalation&#xA;&#xA;The #1 CySA+ exam mistake: escalating too early.&#xA;&#xA;NIST IR lifecycle · triage vs escalate · containment strategy · Domain 3 traps.&#xA;&#xA;Free 👇 techicsavvy.com/ir-phase-sequencing/&#xA;&#xA;#CySA #IncidentResponse #SOC #BlueTeam #CompTIA&#xA;https://techicsavvy.com/ir-phase-sequencing/?utm_source=bluesky&amp;utm_medium=jetpack_social</description><pubDate>30 Apr 2026 17:13 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mkq4eklelm2v</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mkmnjbkzv72u</link><description>Wireshark Lab: Detecting DNS Exfiltration in PCAP Traffic&#xA;&#xA;Learn how to detect DNS exfiltration in Wireshark PCAP files. Step-by-step lab walkthrough covering key filters, indicators of compromise, and CySA+ CS0-003 exam tips.&#xA;https://techicsavvy.com/2026/04/29/wireshark-dns-exfiltration/?utm_source=bluesky&amp;utm_medium=jetpack_social</description><pubDate>29 Apr 2026 08:09 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mkmnjbkzv72u</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mkm2vq2w3o2g</link><description>Threat Hunting 101: How SOC Analysts Find What SIEM Misses&#xA;&#xA;Learn how SOC analysts proactively hunt threats SIEM misses. Covers Pyramid of Pain, hypothesis-driven hunting, and CySA+ CS0-003 Domain 1 exam tips.&#xA;https://techicsavvy.com/2026/04/28/threat-hunting-101/?utm_source=bluesky&amp;utm_medium=jetpack_social</description><pubDate>29 Apr 2026 02:36 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mkm2vq2w3o2g</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mcbhk57oax23</link><description>Real-world experience is key in cybersecurity. Learn 10 ways to practice your skills safely and effectively, including labs, virtual environments, and community challenges. #CyberSecurity #InfoSec #CyberSkills #CareerGrowth #TechTips</description><pubDate>13 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mcbhk57oax23</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mc6x33zp4y2n</link><description>Network Address Translation (NAT) allows multiple devices in a private network to access the internet using a single public IP. Learn how it works and why it’s essential. #NAT #Networking #ITSkills #CyberSecurity #TechEducation</description><pubDate>12 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mc6x33zp4y2n</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mc4gl6szto2u</link><description>Prevent API attacks like injection, broken auth, and data leaks by following these key API security best practices. #API #CyberSecurity #InfoSec #DevSecOps #TechTips</description><pubDate>11 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mc4gl6szto2u</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbzw4cvcbq2r</link><description>DNS cache poisoning tricks your browser into visiting malicious websites by injecting false DNS data. Attackers can steal credentials, inject malware, or perform phishing. Learn the attack flow and how to prevent it. #DNS #DNSPoisoning #CyberSecurity #InfoSec #Networking</description><pubDate>10 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbzw4cvcbq2r</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbxfnewhsl2q</link><description>Linux supports multiple file systems like ext4, XFS, Btrfs, and more. Learn their features, use cases, and how to manage them. #LinuxFileSystems #SysAdmin #TechTips #LinuxBasics</description><pubDate>09 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbxfnewhsl2q</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbuv6fnl542o</link><description>HSTS forces browsers to use HTTPS, preventing protocol downgrade attacks and cookie hijacking. Here’s a handy cheatsheet to implement it correctly. #HSTS #WebSecurity #CyberAwareness #InfoSec #TechTips</description><pubDate>08 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbuv6fnl542o</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbseqg6akq2l</link><description>Protecting your accounts requires more than just passwords. Learn secure authentication methods like two-factor authentication, multi-factor authentication, biometrics, and hardware security keys to prevent unauthorized access and data breaches. #CyberSecurity #Authentication #InfoSec #MFA #TechTips</description><pubDate>07 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbseqg6akq2l</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbpue3igjs26</link><description>Scan-to-Pay uses QR codes to transfer money instantly from your bank or wallet app. Learn the step-by-step process behind this cashless convenience. #ScanToPay #DigitalPayments #FinTech #Cashless #TechTips</description><pubDate>06 Jan 2026 02:03 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbpue3igjs26</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbndskclm52r</link><description>Prevent privilege escalation, unauthorized access, and data breaches by understanding these 6 dangerous AD misconfigurations and fixing them now. #ActiveDirectory #CyberAwareness #ITSecurity #InfoSec #CyberDefense</description><pubDate>05 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbndskclm52r</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbktcm2vvc2j</link><description>Load balancing works like a traffic controller for servers—distributing requests evenly so no single server crashes. Discover how it boosts performance, reliability, and user experience. #LoadBalancing #Networking #CyberSecurity #ITFundamentals #TechTips</description><pubDate>04 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbktcm2vvc2j</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbictnb4ia26</link><description>VPN tunneling creates a secure, encrypted connection between your device and the internet, protecting data from hackers and snoopers. #VPN #CyberSecurity #Privacy #InfoSec #NetworkSecurity</description><pubDate>03 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbictnb4ia26</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbfseqx5gl2q</link><description>OSI layers provide a roadmap of network communication—and potential attack points. Learn common attacks like MITM, sniffing, and DoS at each layer. #OSILayers #CyberDefense #InfoSec #NetworkingFundamentals</description><pubDate>02 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbfseqx5gl2q</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbdbvsziky2r</link><description>Networking on Windows made easy! Learn commands for IP configuration, ping tests, DNS lookup, route tracing, and more with this ultimate cheatsheet. #WindowsNetworking #CMDCommands #ITSupport #SysAdmin #TechTips</description><pubDate>01 Jan 2026 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbdbvsziky2r</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mbargz3uo72j</link><description>Cybersecurity doesn’t have to be expensive. Discover 15 free tools for vulnerability scanning, malware analysis, penetration testing, and more—perfect for beginners and pros alike. #CyberSecurity #FreeTools #InfoSec #CyberDefense #TechTips</description><pubDate>31 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mbargz3uo72j</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mb6ay2qa4k2r</link><description>The OSI model breaks networking into seven layers, from Physical to Application, making it easier to understand, troubleshoot, and secure networks. Learn how data travels step by step! #Networking #OSIMODEL #CyberSecurity #TechEducation #InfoTech</description><pubDate>30 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mb6ay2qa4k2r</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mb3qj3nsei2l</link><description>Network protocols are like a chain—each layer depends on the one below it to function properly. Understanding these dependencies is essential for designing, troubleshooting, and securing modern networks. #NetworkingFundamentals #ProtocolDependency #CyberSecurity #ITEducation</description><pubDate>29 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mb3qj3nsei2l</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3maza27fxyr2q</link><description>Web applications face countless threats, but the OWASP Top 10 pinpoints the most critical ones. Knowing these vulnerabilities helps you secure apps, protect users, and prevent breaches. #OWASPTop10 #CyberSecurity #AppSec #InfoSec #TechEducation</description><pubDate>28 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3maza27fxyr2q</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mawpl7zqxt2l</link><description>Your device has an address… but what kind? Let’s break down public, private, static, dynamic, and more.&#34; #Subnetting #Networking101</description><pubDate>27 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mawpl7zqxt2l</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mau74cheyi2m</link><description>HackGPT breaks down hacking concepts in seconds—scripts, payloads, exploits and defense strategies.&#34; #HackGPT #RedTeam #BlueTeam</description><pubDate>26 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mau74cheyi2m</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3marondjar32m</link><description>Ever wondered how typing a website name takes you online? Learn how DNS translates names to IPs! #DNS #CyberSecurity #Networking #InfoTech #TechTips</description><pubDate>25 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3marondjar32m</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3map66h24d32u</link><description>Level up your IT support skills! Master essential CMD commands every tech pro should know. #ITSupport #CMDCommands #SysAdmin #TechTips #WindowsAdmin</description><pubDate>24 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3map66h24d32u</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mamnpil4sx2u</link><description>0-day RCE threat on Samsung phones! Hackers can remotely execute code—CISA warns users to patch immediately. #SamsungSecurity #CyberAwareness #ZeroDay #MobileSecurity #InfoSec</description><pubDate>23 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mamnpil4sx2u</guid></item><item><link>https://bsky.app/profile/funbirdllc.bsky.social/post/3mak5aqqj5g2j</link><description>Dive into the world of networking: understand protocols, layers, and devices that keep data flowing. #Networking #TechTips #ITFundamentals #CyberSecurity #InfoTech</description><pubDate>22 Dec 2025 02:01 +0000</pubDate><guid isPermaLink="false">at://did:plc:gmtdmunvdvdtle3n2uh5jlsi/app.bsky.feed.post/3mak5aqqj5g2j</guid></item></channel></rss>